{"title":"使用云计算的安全电子政务系统维护正义和正确决策","authors":"S. Gomathi, Delphia. I, J. Vijayalakshmi","doi":"10.1109/ICCCT53315.2021.9711821","DOIUrl":null,"url":null,"abstract":"Nowadays in several criminal cases the progress makes us to think whether justice persists. In existing system, many news, and articles state that the victim data is manipulated, and records are changed by the officials. To address this issue, this paper proposes a secure system rendering justice with transparency which makes the court decision making easy. In the proposed Justice Secure Model, the victim voice data and records are prevented from data tampering using security policies. The criminal voice data are transformed into text using Hidden Markov Model (HMM). The voice data and records are secured by encrypting using Secured Hash Algorithm (SHA 256). To validate the access request, each victim records are embedded with private key. These private keys are securely transmitted by encrypting using modified AES algorithm. The above steps would avoid the internal data tampering and manipulating the victim case data. To address the external intrusion, our proposed methodology detects and prevent SQL injection attacks. Finally, to provide security of data at the server level, we have integrated multiple cloud storage system. The proposed system provide security at the application and server levels, thus making the unauthorized data access, intrusion, and data manipulation impossible.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure E-Governance System To Preserve Justice And Right Decision Making Using Cloud Computing\",\"authors\":\"S. Gomathi, Delphia. I, J. Vijayalakshmi\",\"doi\":\"10.1109/ICCCT53315.2021.9711821\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays in several criminal cases the progress makes us to think whether justice persists. In existing system, many news, and articles state that the victim data is manipulated, and records are changed by the officials. To address this issue, this paper proposes a secure system rendering justice with transparency which makes the court decision making easy. In the proposed Justice Secure Model, the victim voice data and records are prevented from data tampering using security policies. The criminal voice data are transformed into text using Hidden Markov Model (HMM). The voice data and records are secured by encrypting using Secured Hash Algorithm (SHA 256). To validate the access request, each victim records are embedded with private key. These private keys are securely transmitted by encrypting using modified AES algorithm. The above steps would avoid the internal data tampering and manipulating the victim case data. To address the external intrusion, our proposed methodology detects and prevent SQL injection attacks. Finally, to provide security of data at the server level, we have integrated multiple cloud storage system. The proposed system provide security at the application and server levels, thus making the unauthorized data access, intrusion, and data manipulation impossible.\",\"PeriodicalId\":162171,\"journal\":{\"name\":\"2021 4th International Conference on Computing and Communications Technologies (ICCCT)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 4th International Conference on Computing and Communications Technologies (ICCCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCT53315.2021.9711821\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT53315.2021.9711821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure E-Governance System To Preserve Justice And Right Decision Making Using Cloud Computing
Nowadays in several criminal cases the progress makes us to think whether justice persists. In existing system, many news, and articles state that the victim data is manipulated, and records are changed by the officials. To address this issue, this paper proposes a secure system rendering justice with transparency which makes the court decision making easy. In the proposed Justice Secure Model, the victim voice data and records are prevented from data tampering using security policies. The criminal voice data are transformed into text using Hidden Markov Model (HMM). The voice data and records are secured by encrypting using Secured Hash Algorithm (SHA 256). To validate the access request, each victim records are embedded with private key. These private keys are securely transmitted by encrypting using modified AES algorithm. The above steps would avoid the internal data tampering and manipulating the victim case data. To address the external intrusion, our proposed methodology detects and prevent SQL injection attacks. Finally, to provide security of data at the server level, we have integrated multiple cloud storage system. The proposed system provide security at the application and server levels, thus making the unauthorized data access, intrusion, and data manipulation impossible.